All resources sponsored by:

Veracode, Inc.

1 - 25 of 38 Matches
ROI and Benefits of a Cloud-Based Application Security Service
sponsored by Veracode, Inc.
WHITE PAPER:In this report from Forrester Research, Inc., discover the potential ROI you could achieve by deploying a cloud-based application security service. Explore the costs and risk of this technology, and weigh them with the benefits you could experience.
Posted: 24 Jul 2014 | Published: 24 Jul 2014
Get This Now


8 Patterns of Secure Agile Teams
sponsored by Veracode, Inc.
WHITE PAPER:Secure application development can be challenging for Agile teams, as short Agile sprints don't lend themselves well to the time-consuming process of finding and fixing application vulnerabilities. In this white paper, discover eight best practices for integrating security and Agile development.
Posted: 24 Jul 2014 | Published: 24 Jul 2014
Get This Now


Appropriate Third Party Software Security Controls
sponsored by Veracode, Inc.
WHITE PAPER:This informative whitepaper explores the appropriate security controls for your third party services and software.
Posted: 08 Jul 2014 | Published: 08 Jul 2014
Get This Now


Understanding the Risks of Mobile Applications
sponsored by Veracode, Inc.
WHITE PAPER:View this white paper for a primer on the mobile application security landscape. Explore the top risks for mobile applications and learn what you can do to mitigate them in your enterprise.
Posted: 07 Jul 2014 | Published: 28 Feb 2011
Get This Now


Ten Tips for Building a Successful Vendor Application Security Program
sponsored by Veracode, Inc.
WHITE PAPER:If you rely on commercial, outsourced, cloud and mobile applications, you need a plan for vendor security compliance. In this resource, get 10 tips for building a successful vendor application security plan.
Posted: 07 Jul 2014 | Published: 07 Jul 2014
Get This Now


Streamline Compliance with Cloud-based Application Security
sponsored by Veracode, Inc.
DATA SHEET:This white paper introduces a cloud-based application security platform that assesses mobile, web, and third-party applications for standard controls and ensures compliance with OX, HIPAA, NIST 800-53, MAS, and other mandates.
Posted: 07 Jul 2014 | Published: 07 Jul 2014
Get This Now


Mobile Application Security Survey Results
sponsored by Veracode, Inc.
WHITE PAPER:In this resource, explore the results of a survey on mobile application security. See what security threats businesses are most concerned about, how they're managing applications for end-users, and what security policies, practices, and test they implement.
Posted: 07 Jul 2014 | Published: 30 Jun 2013
Get This Now


Behavioral Analysis: Why it's Key to Mobile App Security
sponsored by Veracode, Inc.
CASE STUDY:In this brief case study, learn how Veracode, an application security company, dealt with security testing for the third-party development of a custom mobile app for iOS and Android. Discover what happens when a security risk is identified, and learn the key steps to decision-making in response.
Posted: 03 Jul 2014 | Published: 31 Dec 2013
Get This Now


Global 100 Manufacturer Reduces Risk Across 30,000 Domains in 8 Days
sponsored by Veracode, Inc.
CASE STUDY:Many globally-operating enterprises suffer from the same problem: identifying and securing web applications over tens of thousands of IP addresses. This brief case study illustrates how one global 100 manufacturer overcame this challenge by transitioning to a cloud-based application security platform.
Posted: 03 Jul 2014 | Published: 03 Jul 2014
Get This Now


Magic Quadrant for Application Security Testing
sponsored by Veracode, Inc.
ANALYST REPORT:Choosing the right software security testing tool can be an overwhelming process. In this Gartner report, make your decision a little easier with a comparison of the top app security testing vendors on the market, including IBM, HP, Veracode, Aspect, and more.
Posted: 03 Jul 2014 | Published: 02 Jul 2013
Get This Now


Global Bank Scales Application Security Program
sponsored by Veracode, Inc.
CASE STUDY:Like many companies, one global bank wanted to transform their security program with a centralized platform that ensured consistency across app development teams. In this case study, discover how the bank leveraged a cloud-based platform to analyze and secure hundreds of business-critical applications at the speed they desired.
Posted: 02 Jul 2014 | Published: 02 Jul 2014
Get This Now


Application Security 101
sponsored by Veracode, Inc.
WHITE PAPER:View this white paper for a guide to modern application security with a focus on why software development teams should be trained in secure development techniques.
Posted: 02 Jul 2014 | Published: 02 Jul 2014
Get This Now


Addressing the Scalability Challenge of Application Security with Veracode
sponsored by Veracode, Inc.
WHITE PAPER:In this white paper, discover a simpler, more scalable approach to application security across your entire infrastructure -- including web, mobile, and third-party apps. Read now to learn how this cloud-based platform helps overcome five common security challenges.
Posted: 02 Jul 2014 | Published: 02 Jul 2014
Get This Now


Building Security into the Agile SDLC: View from the Trenches
sponsored by Veracode, Inc.
WEBCAST:In this webinar, learn how to build security into the Agile software development lifecycle (SDLC) first hand from two security and development professionals. Discover how they were able to make security part of core development efforts and get executive support to build a more secure SDLC.
Posted: 02 Jul 2014 | Premiered: Mar 13, 2014
Get This Now


A Pragmatic Approach to Benchmarking Application Security
sponsored by Veracode, Inc.
WEBCAST:In this webcast, a pragmatic approach is introduced to benchmark application security.
Posted: 25 Jun 2014 | Premiered: Jun 25, 2014
Get This Now


Successful Application Security Testing for Agile Development
sponsored by Veracode, Inc.
WHITE PAPER:Find out how one leading vendor is working to provide only the best coding practices and application security testing, so businesses like you can make sure your applications are safe and secure.
Posted: 23 Jun 2014 | Published: 23 Jun 2014
Get This Now


Delivering Secure SaaS Solutions
sponsored by Veracode, Inc.
WHITE PAPER:Find out how one vendor is designing, implementing, maintaining and auditing security in every layer of their cloud-based services to make sure their customers are happy and their mission-critical, confidential applications remain safe.
Posted: 23 Jun 2014 | Published: 23 Jun 2014
Get This Now


Five Program Management Best Practices
sponsored by Veracode, Inc.
CASE STUDY:Find out how program management helped one company achieve a successful application security program.
Posted: 23 Jun 2014 | Published: 23 Jun 2014
Get This Now


Disclosures 2012 - The Vulnerability of Publicly Traded Companies
sponsored by Veracode, Inc.
WEBCAST:In a recently-released State of Software Security featured supplement, Veracode examines the software security posture of public companies and the material risks they face due to the weaknesses in their software applications. This webinar uses Veracode data to examine how public companies manage the risks inherited from software.
Posted: 24 May 2012 | Premiered: May 23, 2012
Get This Now


Top 10 Mobile Application Risks
sponsored by Veracode, Inc.
WEBCAST:In this presentation, Veracode’s Vice President of Security Research, Chris Eng, will outline the Top 10 Mobile Application Risks, designed to educate developers and security professionals about the mobile application behavior – both maliciously- designed or inadvertent – putting users at risk.
Posted: 11 May 2012 | Premiered: May 11, 2012
Get This Now


Understanding the risks of mobile apps
sponsored by Veracode, Inc.
WHITE PAPER:Many of the risks of moble devices are similar to those of traditional spyware, Trojan software, and insecurely designed apps. However, mobile devices are not just small computers. They are designed around personal and communication functionality which makes the top mobile applications risks different from the top traditional computing risks.
Posted: 11 May 2012 | Published: 11 May 2012
Get This Now


Expert guide to understanding SaaS and cloud computing issues
sponsored by Veracode, Inc.
EGUIDE:This expert E-Guide discusses what is involved with a SaaS transition and how you can prepare. Uncover top considerations, potential cloud computing issues and how you can tackle them.
Posted: 21 Dec 2011 | Published: 21 Dec 2011
Get This Now


State of Software Security Report Volume 4
sponsored by Veracode, Inc.
WHITE PAPER:Version 4 of the State of Software Security is a semi-annual report that analyzes and examines the emerging trends associated with vulnerabilities in applications, whether they are internally developed or procured from third parties such as outsourcers or commercial software vendors.
Posted: 07 Dec 2011 | Published: 07 Dec 2011
Get This Now


Musings on the PSN Attack Vector
sponsored by Veracode, Inc.
WEBCAST:Recently, there has been a lot of commentary around the breach of Sony’s PlayStation Network. Sadly, there has been no good discussion of how PSN was breached. Join Veracode's Security Researcher, Chris Lytle, as he explores the rumors in the marketplace regarding the Sony breach, and discusses the "probable vs. "possible" attack vectors.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011
Get This Now


Dirty Little Secrets: Mobile Apps Invading Your Privacy
sponsored by Veracode, Inc.
WEBCAST:Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications.
Posted: 27 Jul 2011 | Premiered: Jul 27, 2011
Get This Now


1 - 25 of 38 Matches
Page: 2 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement